Analysis
-
max time kernel
153s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 16:44
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Tedy.114694.19007.exe
Resource
win7-20220414-en
General
-
Target
SecuriteInfo.com.Variant.Tedy.114694.19007.exe
-
Size
681KB
-
MD5
2cba74e140ba210f336ed6c82b623421
-
SHA1
9dfff2f3820e38134b73d14183f75839e16e0db7
-
SHA256
ac46b90f8d9ca2ae2a08ab608bd6cd3353d88684a188e4dc725f232a62d50017
-
SHA512
9ede1432bedb79d33510f2c153f8085835e389acef2b8284f91433092d1852e4fc54e86b332f159b20706dcdbb2dfeb4db0725880a4eef583722bdf0ae3d2f45
Malware Config
Extracted
lokibot
http://sempersim.su/gh18/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
winver.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook winver.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook winver.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook winver.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Variant.Tedy.114694.19007.exedescription pid process target process PID 3456 set thread context of 4144 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe winver.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
SecuriteInfo.com.Variant.Tedy.114694.19007.exepid process 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SecuriteInfo.com.Variant.Tedy.114694.19007.exewinver.exedescription pid process Token: SeDebugPrivilege 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe Token: SeDebugPrivilege 4144 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
SecuriteInfo.com.Variant.Tedy.114694.19007.exedescription pid process target process PID 3456 wrote to memory of 4144 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe winver.exe PID 3456 wrote to memory of 4144 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe winver.exe PID 3456 wrote to memory of 4144 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe winver.exe PID 3456 wrote to memory of 4144 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe winver.exe PID 3456 wrote to memory of 4144 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe winver.exe PID 3456 wrote to memory of 4144 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe winver.exe PID 3456 wrote to memory of 4144 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe winver.exe PID 3456 wrote to memory of 4144 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe winver.exe PID 3456 wrote to memory of 4144 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe winver.exe PID 3456 wrote to memory of 4144 3456 SecuriteInfo.com.Variant.Tedy.114694.19007.exe winver.exe -
outlook_office_path 1 IoCs
Processes:
winver.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook winver.exe -
outlook_win_path 1 IoCs
Processes:
winver.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook winver.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Tedy.114694.19007.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Tedy.114694.19007.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\winver.exe"C:\Windows\SysWOW64\winver.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4144
-